Privacy Policy

Who we are

Our website address is: http://myprotecht.com/.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

HOW GOOGLE USES INFORMATION FROM SITES OR APPS THAT USE OUR SERVICES

Many websites and apps use Google services to improve their content and keep it free. When they integrate our services, these sites and apps share information with Google.

For example, when you visit a website that uses advertising services like AdSense, including analytics tools like Google Analytics, or embeds video content from YouTube, your web browser automatically sends certain information to Google. This includes the URL of the page you’re visiting and your IP address. We may also set cookies on your browser or read cookies that are already there. Apps that use Google advertising services also share information with Google, such as the name of the app and a unique identifier for advertising.

Google uses the information shared by sites and apps to deliver our services, maintain and improve them, develop new services, measure the effectiveness of advertising, protect against fraud and abuse, and personalize content and ads you see on Google and on our partners’ sites and apps. See our Privacy Policy to learn more about how we process data for each of these purposes and our Advertising page for more about Google ads, how your information is used in the context of advertising, and how long Google stores this information.

Our Privacy Policy explains the legal grounds Google relies upon to process your information — for example, we may process your information with your consent or to pursue legitimate interests such as providing, maintaining and improving our services to meet the needs of our users.

Sometimes, when processing information shared with us by sites and apps, those sites and apps will ask for your consent before allowing Google to process your information. For example, a banner may appear on a site asking for consent for Google to process the information that site collects. When that happens, we will respect the purposes described in the consent you give to the site or app, rather than the legal grounds described in the Google Privacy Policy. If you want to change or withdraw your consent, you should visit the site or app in question to do so.

Ad personalization

If ad personalization is turned on, Google will use your information to make your ads more useful for you. For example, a website that sells mountain bikes might use Google’s ad services. After you visit that site, you could see an ad for mountain bikes on a different site that shows ads served by Google.

If ad personalization is off, Google will not collect or use your information to create an ad profile or personalize the ads Google shows to you. You will still see ads, but they may not be as useful. Ads may still be based on the topic of the website or app you’re looking at, your current search terms, or on your general location, but not on your interests, search history, or browsing history. Your information can still be used for the other purposes mentioned above, such as to measure the effectiveness of advertising and protect against fraud and abuse.

When you interact with a website or app that uses Google services, you may be asked to choose whether you want to see personalized ads from ad providers, including Google. Regardless of your choice, Google will not personalize the ads you see if your ad personalization setting is off or your account is ineligible for personalized ads.

You can see and control what information we use to show you ads by visiting your ad settings.

How you can control the information collected by Google on these sites and apps

Here are some of the ways you can control the information that is shared by your device when you visit or interact with sites and apps that use Google services:

  • Ad Settings helps you control ads you see on Google services (such as Google Search or YouTube), or on non-Google websites and apps that use Google ad services. You can also learn how ads are personalized, opt out of ad personalization, and block specific advertisers.
  • If you are signed in to your Google Account, and depending on your Account settings, My Activity allows you to review and control data that’s created when you use Google services, including the information we collect from the sites and apps you have visited. You can browse by date and by topic, and delete part or all of your activity.
  • Many websites and apps use Google Analytics to understand how visitors engage with their sites or apps. If you don’t want Analytics to be used in your browser, you can install the Google Analytics browser add-on. Learn more about Google Analytics and privacy.
  • Incognito mode in Chrome allows you to browse the web without recording webpages and files in your browser or Account history (unless you choose to sign in). Cookies are deleted after you’ve closed all of your incognito windows and tabs, and your bookmarks and settings are stored until you delete them. Learn more about cookies.
  • Many browsers, including Chrome, allow you to block third-party cookies. You can also clear any existing cookies from within your browser. Learn more about managing cookies in Chrome.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website, we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments are checked through an automated spam detection service.

What security measures does our server host provide?

Our server is protected from DDoS attack (UDP flood).

We have an extensive custom firewall rule and large mod security rule sets protecting our servers from a variety of forms of attack. If we do experience heavy flooding, we have our datacenter enable network level flood protection. Our datacenters are all highly secure facilities with restricted access.

We also employ additional server security methods and precautions that are confidential.

We also practice the following security measures:

  • Password security
  • Keeping all installed website applications up-to-date
  • Ensuring site is malware free

Responsibly ensuring that the scripts and programs installed on our account are secure and that the permissions of directories are set properly regardless of installation method. We set permissions of directories to be as restrictive as possible, typically 755.

Our host performs regular audits to identify weak account passwords. If a password is determined to be weak, you will be notified and given time to update it. If you continue to use a weak password, your account can be suspended until you agree to use a more secure password. Strong passwords should include at minimum 8 characters, one capital letter, one lowercase letter, one number and a special character such as an “@” symbol. Passwords should also not contain dictionary words or usernames in them.

What data breach procedures we have in place

Step 1: Know there’s been a breach

The ugly truth about data theft is that skilled criminals can ransack our company data and leave – or worse, hang around in our system collecting data as it arrives – without dropping clues most of us can spot. That’s why so many companies learn about their system breaches from outside sources like banks and customers. If we get such a report, we take it seriously and activate our response plan right away. If our security software shows an infection, it’s also time to act.

Step 2: Isolate the problem

Regardless of how we learn about our suspected or confirmed breach, we’ll figure out which computers and/or servers are compromised. Take them off our business network – physically unplug their Ethernet cables or wireless adapters – and disconnect them from the Internet. Put this equipment off-limits for business use, but leave them on. The PCI Security Standards Council advises that powering down infected equipment “may make investigation more difficult and remove answers we need.”

Step 3: Save access and activity logs

This is the step when enterprise-level businesses bring in the IT forensics experts to see who’s had system access and what they did. We appoint a staff member ahead of time to back up and save the logs from each piece of compromised equipment and from our network in the event of a breach. We may not ever learn exactly which data was compromised, but keeping a record of the logs is critical if law enforcement or card issuers launch an investigation.

Step 4: Inform our payment and banking partners

Any time customers’ payment data is at risk, we notify our payment processor, merchant bank, and major credit card issuers right away. Our processor and bank will step up monitoring and review of our orders. Depending on the volume of credit card transactions our business generates, the card issuers may want to launch a forensics investigation led by a PCI-approved professional. We then follow our payment partners procedures set for breach reporting and follow them. Late reporting can increase our liability for breach losses.

Step 5: Notify law enforcement

The Federal Trade Commission and the Better Business Bureau recommend that we contact our local police department, state law enforcement, or the FBI to report the breach.

Step 6: Call the credit bureaus

If our business stores customers’ personally identifiable information, payment data, or social security numbers, we also notify the three major credit bureaus (Experian, Equifax, and TransUnion) so they can flag customers’ files.

Step 7: Tell our customers

Transparency is the best policy. It’s also the law in most states and major territories. (The National Council of State Legislatures keeps a current list of state and territory breach laws you can check.) We are upfront when we contact our customers. Experian advises businesses that “consumers want to see facts about the breach, information about the risks they may face, steps they can take to protect themselves.” We give details if we have them. If we’re unsure what information was stolen, we say so.

Step 8: Tighten our security

We then learn all we can from the data breach to figure out where our business is vulnerable and how to prevent a repeat incident. We cooperate with any investigators working on our case and update our customers on how we’re strengthening our protection of their data.